Tectoro EMM is an Android Enterprise Recommended EMM (Enterprise Mobility Management) software. It helps organizations to enroll organization owned / BYOD devices using Android Enterprise Management API.
Tectoro EMM with the help of Android Enterprise, ensures your device is in compliance with the policies defined by your organization IT Administrator. This ensures that your device is safe and is ready for use for your work purposes.
Tectoro EMM comprises all apps that are mentioned below. These are available in Google Play Store. These apps are the work of Tectoro EMM and can be used only on devices that are enrolled into Tectoro EMM by your Organization. These apps are not for public usage.
Tectoro EMM apps may also be released with different names through Managed Google Play, aka organization specific exclusive play store available only through Tectoro EMM admin console.
Personal Information is anything that identifies any information that can be used to identify a person. It can range from basic information, like a person's name or phone number, to intricate details, including biometric data and location tags .
It is a company policy that our customer databases remain confidential and private. We have not, will not, and won't ever sell names to "spammers" or other parties who would like to use our databases to advertise or solicit their products or services. Your private information is safe with us.
The information that is being collected when the device is enrolled into the Tectoro EMM is automatic. No information is explicitly requested from the user to input.
The information that is automatically collected is dependent upon the features that are enabled by yourIT Administrator on your organization account in Tectoro EMM admin console. Here is the possible information that can be collected :
The permissions required for the apps and overall, EMM functionality, depend on the features enabled by your IT Administrator. The below list comprises a master set of all the permissions.
Storage permissions, read write, notification permissions, wallpaper, Wi-Fi state, call logs, location, request ignore battery optimizations, ic-id (sim), vibrate, package usage stats, receive boot completed, read phone state, app usage, android.uid.system for the boot logo.
The information is being used by the IT Administrators for the features that he enables on the devices and varies from one application to another. The information gathered is used to ensure device compliance with the Organization Policies defined by your IT Administrator. The information also allows your IT administrator to take any automatic actions in case of any policy violations detected.
For example, the location information is being used by the Geo-fencing feature. The policy defined by your IT Administrator may automatically disable or lock your device if it is moved out of the defined geographical boundary.
Your IT Administrator may completely control your device. He can control what apps installed on your device, what controls or settings enabled on your device, wallpaper, boot animation, automatic security updates, and installs, kiosk mode, security alerts, geolocation or geofencing that can auto-lock lost or stolen devices.
We have taken security measures, consistent with international information practices, to protect your personal information, which offers adequate level of personal data protection according to Industry standards and best practices. These measures include technical and procedural steps to protect your data from misuse, unauthorized access or disclosure, loss, alteration or destruction.
All the sensitive information collected from your device is end-to-end encrypted, i.e., they are encrypted during transit as well as stored in encrypted format
Your devices are enrolled into Tectoro EMM by your organization IT administrator to ensure they are controlled and compliant with the organization policies and are safe to use for work purposes. All the information collected about your device is shared with your organization IT administrator through Tectoro EMM admin console. The sensitive/PII information is end-to-end encrypted and hence is accessible only to your IT administrator.
According to GDPR, Data subjects (any information relating to an identified or identifiable natural person) have the right to access data, right to rectification, right to erasure and the right not to be subject to individual decisions. Data subjects/You also have the right to restriction of personal data processing and to request the deletion of the collected personal data, as well as the right to data portability. To exercise these rights, you may reach out to your organization IT administrator with a written request.
That’s it! Thanks for reading.
For any queries related to the data you can reach out to your Organization IT Admin. For any queries related to system you can reach out to our customer support email@example.com